Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Former owners of T-Mobile retail store arrested on federal charges alleging $25 million scheme to illicitly unlock cell phones
- Man gets 51 months in prison for $10M BEC fraud, romance scam
- Authorities arrest three suspected admins of France’s biggest darkweb market
- U.S. Customs and Border Protection says photos of travelers were taken in a data breach
- Photos of travelers coming in and out of the US have been hacked and stolen
- Team of American hackers and Emirati spies discussed attacking The Intercept
- Spy used AI-generated face to connect with targets
- How cybercriminals recruited young Romanian woman
- Alphabet-owned Jigsaw bought a Russian troll campaign as an experiment
- Google promises to play nice with ad blockers (again)
- WhatsApp is finally going after outside firms that are abusing its platform
- Radiohead bypasses hackers to publish its ‘OK Computer’ demos + more information
- How a retired couple found lottery odds in their favor
For the more technical
- Microsoft releases June 2019 security updates to patch 88 vulnerabilities
- Critical vulnerabilities in NTLM allow remote code execution and cloud resources compromise + more information
- CVE-2019-2725 exploited and certificate files used for obfuscation to deliver Monero miner
- Vulnerabilities in Thunderbird email client allow code execution
- RAMBleed: Reading bits in memory without accessing them
- Oracle about RAMBleed DRAM vulnerabilities
- Critical vulnerability discovered in Evernote’s Chrome extension
- MITM proxy: New search hijack method on Mojave
- MyBB: From stored XSS to RCE
- Critical vulnerability exposes oil tank monitoring devices to attacks
- Dangerous vulnerability fixed in Cisco Industrial Network Director
- Hunting COM Objects – part I & II
- Using Anomaly Detection to find malicious domains
- Large european routing leak sends traffic through China Telecom
- FIN8 is back in business, targeting the hospitality industry
- Outlaw hacking group’s botnet observed spreading miner, Perl-based backdoor
- Xenotime now targeting electric sector, in addition to oil and gas
- The highly dangerous ‘Triton’ hackers have probed the US Grid
- State of industrial control systems in Poland and Switzerland
- GoldBrute botnet brute forcing 1.5 million RDP servers
- AESDDoS botnet malware infiltrates containers via exposed Docker APIs
- Analysis of banking trojan Trickbot
- Advanced targeted attack tools found being used to distribute cryptocurrency miners
- Ransomware halts production for days at major airplane parts manufacturer + more information
- A multidisciplinary assessment of the stalkerware application industry (PDF)
- Forensic implications of iOS jailbreaking
- Use your Android phone’s built-in security key to verify sign-in on iOS devices
- Yubico to replace vulnerable YubiKey FIPS security keys
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.